The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper uses two Markov chains to model IEEE 802.11p EDCA throughput over service channels. A 2-D Markov chain is constructed first to describe the backoff procedure of each access category and to infer its transmission probability. Then, a 1-D discrete Markov chain is used to describe the contention phase of an access category and to derive its collision probability. Both models consider the backoff...
In the existing works, a Kalman filter with recursive covariance estimation (KF-RCE) was proposed by Bo Feng et al. to sequentially estimating process noise covariance matrix. However, there may be a singular matrix existed in the KF-RCE algorithm, which would lead to unreasonable system state estimation in the system initial stage. In this paper, a threshold-based Kalman filter with recursive covariance...
In order to solve the contradiction between the reliability of video transmission and the network bandwidth fluctuations, a two time-scales network bandwidth measurement for video stream transmission is proposed. Firstly, a model-based long time-scale bandwidth trend extraction is proposed, which is used to calculate the current bandwidth through a Transmission Control Protocol (TCP) throughput model,...
This paper presents an analytical performance evaluation framework for 4G/WiFi multihoming techniques. Several multihoming flavors have been compared, with a focus on user centric allocation strategies. In these strategies the user splits his packets between two radio interfaces following a policy that depends on the amount of information he gets. First, the simplest policy is considered in which...
Next generation of mobile technologies demands high date rates and low round trip times. Therefore, we analyze deployments that offer these performance capabilities. We consider the fundamental issue of the expenses of the network's installation, maintenance and operation. We calculate the costs of Distributed Antenna Systems (DAS) and small cells by describing updated cost models for each one. We...
Non-Orthogonal Multiple Access (NOMA) is considered as a promising downlink Multiple Access (MA) scheme for future radio access. In this paper two power allocation strategies for NOMA are proposed. The first strategy is based on channel state information experienced by NOMA users. The other strategy is based on pre-defined QoS per NOMA user. In this paper we develop mathematical models for the proposed...
Wi-Fi is widely used to connect electronic devices wirelessly using ISM radio bands. Previous studies have reported traffic congestion in Wi-Fi due to several reasons. As an alternative, unused spectrum in TV band known as TV white space (TVWS) can be utilized for the same purpose. The use of Wi-Fi technology in TV band is also known as White-Fi. TVWS ranges in VHF and UHF that is not utilized by...
The well-known distributed power control algorithm with temporary removal and feasibility check (DFC) improves outage probability but it is not able to improve and maximize the system throughput simultaneously. In this paper, we have proposed a new algorithm which gives an improvement in DFC algorithm such that it optimizes the transmission sum rate and reduces the number of outage users at the same...
The dependence of TCP downstream throughput (TCPdownT) on signal to noise ratio (SNR) has been studied in this paper. Measurements were taken for multiple users in small offices, open corridors and free space environments using an infrastructure based IEEE 802.11b WLAN while transmitting different quality of service (QoS) traffic. Models able to predict TCPdownT with respect to SNR observed were developed...
In this paper, we derive an expression for throughput of TCP Compound connections with random losses. We consider the case of a single TCP connection with random losses and negligible queuing, i.e., constant round trip time. For this case, an approximation of throughput has been derived earlier using a deterministic loss model. We provide a theoretical justification for this approximation. Further,...
Recently, information and communication technology has been attracting attention in medical field. Among them, BAN(Body Area Network) becomes important because it is suitable for the watch of medical information. However, certification of BAN takes a lot of time in Japan because it must be approved with both of the Radio Act and Pharmaceutical and Medical Device Act(PMD Act). Therefore, we propose...
This paper presents a comparative study between NS-2 and OPNET Modeler simulators focusing on the performance evaluation of the IEEE 802.11b technology on ad-hoc networks. Moreover, the research tests the throughput of WLAN ad-hoc network against the change in the number of nodes via simulation using OPNET Modeler and NS-2, and then compares that with reference to Bianchi Equations. From the results...
Due to changing requirements and increasing engineering efforts of manufacturing systems, methods such as plug and produce gain in importance. The ability to adapt to varying product variants and new manufacturing modules can be achieved through cyber-physical production systems. In this context orchestration, the process of selecting suitable manufacturing modules, is a major aspect. Current approaches...
A distributed and collaborative nature of wireless sensor network cause many challenges to provide security in network. Most of the outsider's attacks are prevented by encryption and authentication technology, but to control insider attacks are difficult. A malicious sensor node causes lot of packet losses, energy wastage and increase in time to reach final destination. In this paper, Enhanced Beta...
As one of the top ten countries that has highest internet users, Indonesia is a land of opportunities for service provider companies to grow their market. Indonesian people also love to use their gadget and grow attach to them. To maintain the customers' satisfaction, the service provider companies need to balance the quality of product and the quality perceived by the customers, especially when using...
In this work, a cooperative scenario of cognitive network is considered to maximize the energy efficiency and throughput while maintaining certain boundary conditions like, probability of detection threshold and total power budget allocation. After evaluation of the mathematical form, simulation is done on the basis of relay amplifying factor. Additionally, the optimal level of relay amplifying factor...
This study presents the effect of residual energy of nodes in Wireless Sensor Networks (WSNs). There are many issues and challenges that still need to be solved in this area especially for energy contrain. This factor considered during clustering and routing approached to maximize network lifetime. To prolong network lifetime, there is a need for efficient power control mechanisms to reduce power...
This work addresses an apparently simple but elusive problem that arises when doing high speed networking on Virtual Machines. When a VM and its peer (usually the hypervisor) process packets at different rates, the work required for synchronization (interrupts and “kicks”) may reduce throughput well below the slowest of the two parties.
The widespread use of network access technology has enabled the mobile terminals to have multiple interfaces, which promotes the development of multipath transport. However, there exist some important issues on multipath transport, such as out-of-order packets problem which results from the different performance among sub-flows. Those will lead to unnecessary retransmission, even a decrease in throughput...
Ethernet has spread its territory into metro and backbone networks. Since spanning tree protocol (STP) is impractical for backbone networks routing, many spanning tree based Layer 2 routing schemes have been proposed, such as multiple spanning tree protocol (MSTP) and MSTP based shortest path bridging (MSTP-SPB). We have developed three analytical models for evaluating these routing schemes, but they...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.